Quality Plus Consulting - Breakfast Bytes
Technology
Tom Dean of Consulting Adventures joins Felicia for part three of the analysis on mobile devices and the problems with them.
Information security is not a technical controls issue, it is a HR management issue.
Verizon fell for fake “search warrant,” gave victim’s phone data to stalker
https://arstechnica.com/tech-policy/2023/12/verizon-fell-for-fake-search-warrant-gave-victims-phone-data-to-stalker/
As if all that wasn't bad enough, if an employee of a company has issues in their personal life, it will spill over to business and especially in the context of allowed personal use of company assets.
Practical example of how operational maturity improves productivity while reducing risk
Unlocking Strategic IT Investments and Information Security
Domain/DNS hosting, account ownership, security issues and TCO
Cyber Insurance versus Cyber Warranty
Demystifying IT Services and the Shared Responsibility Paradigm
How establishing requirements properly results in best outcomes
Operational Maturity is required to have Information Security Risk Management
Managing the impact of changing IT service providers
CMMC and latest DoD memo implications and far reaching effects related to FedRAMP
Threats to mobile devices and how to manage them, part 2
Physical threats to mobile phones, SIM hijacking, out of band SMS, and Yubikeys
How to analyze workloads and decide how they should be hosted
How a lack of understanding of business processes relates to adverse financial impact
Email security management and monitoring is critical
CISO, CTO, CIO, what’s the difference?
Zero trust fundamentals
FTC SafeguardsRule, IRS requirements, and tax preparers
Methods to prevent business email compromise
Business survival over the next decade
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
Black Wolf Feed (Chapo Premium Feed Bootleg)
Bannon`s War Room